8
CVEs
0
Critical
2
High
1
KEV
0
PoC
0
Unpatched C/H
50.0%
Patch Rate
1.0%
Avg EPSS
Severity Breakdown
CRITICAL
0
HIGH
2
MEDIUM
4
LOW
1
Monthly CVE Trend
Affected Products (30)
Cloud Foundation
17
Telco Cloud Platform
11
Telco Cloud Infrastructure
10
Aria Operations
5
Linux Kernel
5
Aria Operations For Logs
4
Memory Corruption
4
Windows
4
Vmware Nsx
3
Command Injection
3
Esxi
3
Workstation
2
Ubuntu
2
Qca6564au Firmware
1
Qca6584au Firmware
1
Wcd9395 Firmware
1
Debian Linux
1
Sa6155p Firmware
1
Qcm4490 Firmware
1
Wcd9326 Firmware
1
Use After Free
1
Wcn3980 Firmware
1
Qca6335 Firmware
1
Wsa8840 Firmware
1
Snapdragon Auto 5g Modem Rf Gen 2 Firmware
1
Sm7325p Firmware
1
Sm4635 Firmware
1
Sd865 5g Firmware
1
Wsa8845 Firmware
1
Sm7250p Firmware
1
Top Risky CVEs
| CVE | Summary | Severity | CVSS | EPSS | Priority | Signals |
|---|---|---|---|---|---|---|
| CVE-2026-22719 | VMware Aria Operations contains a command injection vulnerability (CVE-2026-22719, CVSS 8.1) that allows unauthenticated remote attackers to execute arbitrary commands during support-assisted product migration. KEV-listed with patches available, this vulnerability targets the infrastructure monitoring platform that has visibility into the entire virtualized environment. | HIGH | 8.1 | 7.4% | 98 |
KEV
|
| CVE-2026-22720 | Stored XSS in VMware Aria Operations allows authenticated users with benchmark creation privileges to inject malicious scripts and execute arbitrary administrative actions within the platform. This vulnerability affects VMware, Broadcom, and Telco Cloud Infrastructure products with a CVSS score of 8.0, requiring user interaction to trigger the attack. Patches are available through VMSA-2026-0001. | HIGH | 8.0 | 0.1% | 40 |
|
| CVE-2026-22721 | Privilege escalation in VMware Aria Operations allows authenticated users with vCenter access to escalate their privileges to administrative level within Aria Operations. The vulnerability affects multiple Broadcom products including Telco Cloud Platform, Aria Operations, and Cloud Foundation, requiring administrative intervention but no user interaction to exploit. Patches are available through VMSA-2026-0001. | MEDIUM | 6.2 | 0.1% | 31 |
|
| CVE-2026-22715 | VMWare Workstation and Fusion contain a logic flaw in the management of network packets. Known attack vectors: A malicious actor with administrative privileges on a Guest VM may be able to interrupt or intercept network connections of other Guest VM's. [CVSS 5.9 MEDIUM] | MEDIUM | 5.9 | 0.0% | 30 |
No patch
|
| CVE-2026-23215 | The Linux kernel's VMware hypercall implementation improperly handles register state during mouse events, allowing local attackers with user privileges to trigger a denial of service through a kernel panic via crafted input to the vmmouse driver. The vulnerability stems from incomplete register preservation when the QEMU VMware mouse emulation clears the upper 32 bits of CPU registers containing kernel pointers. No patch is currently available for this medium-severity issue affecting Linux systems running on VMware or QEMU with vmmouse support. | MEDIUM | 5.5 | 0.0% | 28 |
|
| CVE-2026-22716 | VMware Workstation 25H1 and earlier contains an out-of-bounds write vulnerability that allows unprivileged guest VM users to crash specific Workstation processes. The vulnerability requires user interaction and does not enable privilege escalation or data theft, making it suitable for denial-of-service attacks against the host virtualization platform. No patch is currently available for this medium-severity flaw. | MEDIUM | 5.0 | 0.0% | 25 |
No patch
|
| CVE-2026-22717 | Out-of-bound read vulnerability in VMware Workstation 25H1 and below on any platform allows an actor with non-administrative privileges on a guest VM to obtain limited information disclosure from the machine where VMware Workstation is installed. [CVSS 2.7 LOW] | LOW | 2.7 | 0.0% | 14 |
No patch
|
| CVE-2026-23430 | Memory leak in Linux kernel drm/vmwgfx driver caused by overwriting KMS surface dirty tracker without proper cleanup. The vulnerability affects the VMware graphics driver subsystem in the kernel, allowing local attackers to trigger memory exhaustion through repeated surface operations. No CVSS score, EPSS data, or KEV status available; fix commits exist in upstream stable kernel branches. | – | 0.0% | – |
No patch
|